CiscoMrs. Ulrica de-Fort Menares, Director of Product Management for Cisco Medianet, told us, "An intelligent network must become more application-savvy. It must have the ability to determine the importance of a session based on its business value, and treat the session accordingly, end to end. One of the key medianet characteristics is its ability to become media-aware. Imagine this: The network can discover the type of endpoint and automatically configure the switch port for that type of device. This ability to plug and play any endpoint in the network is an example of tight integration between an intelligent network and an endpoint."

CyberLock announced a new version of the CyberKey Vault 20, the CyberKey Vault 20 FX. The redesign features a sleek new look with weatherized input modules and an embedded Flex System Hub for improved performance, all offered at a new, lower price.

"The CyberKey Vault 20 FX is our most advanced key control cabinet (http://www.cyberlock.com/cyberkey-vaults.html) yet," said James McGowan, VP of Sales and Marketing at Videx. "We built on the award winning original design and added extra durability and speed to meet the needs of today's demanding end-users. We believe it will surpass market expectations."

The Vault 20 FX is an intelligent key cabinet designed to manage, program, and dispense CyberKey smart keys. The keys are stored unprogrammed and locked securely in the cabinet until an RFID card and/or PIN code is presented to the cabinet. After reading the card and/or accepting the PIN, the CyberKey Vault programs a CyberKey with the individual's permissions. Keys are programmed with access privileges for each user, detailing which electronic locks (http://www.cyberlock.com/cyberlock_cylinders.html) it can open and when. An audit record of all events is stored in both the locks and the keys. Each time a key is used at a lock, a record of the lock ID, date, and time is stored in the key, and a record of the key ID, date, and time is stored in the lock.

CyberKeys feature a unique electronic ID, preventing duplication. Although two keys can be programmed alike, each one leaves its own unique record within the system. When the key is returned to the Vault, the Vault downloads the key's audit trail, removes its permissions, and begins charging the key.

ImageWare Systems recently announced, "In addition to product development, ImageWare has been preparing for a major international deployment as the exclusive provider of biometric identity management for a prime contractor installing cargo scanning security at the Republic of Ecuador's major seaports. The initial deployment is currently scheduled to begin in the early part of 2013 at the Port of Guayaquil, the country's main seaport that handles a majority of its imports and exports. ImageWare expects to receive a fee for every port worker receiving credentials, as well as an annual management and maintenance fee, based on a percentage of the initial credentialing cost per worker. Depending upon the number of enrollees, the company expects the contract value to exceed $3.0 million over its seven year term."

"The high-end biometric secure credentialing solution we are providing for Ecuador is the same technology being deployed for the Los Angeles World Airports, which we announced earlier this year," noted Jim Miller, Chairman and CEO. "In fact, we can easily replicate this platform for virtually any port system that needs transportation worker identification cards in order to comply with the SAFE Port Act. Not only are our solutions easily deployable, for ImageWare they generally represent gross margins above 70% as well as a recurring revenue stream. Our unique patented technology has the potential to provide us strong, steady revenue growth, along with excellent forward-looking visibility."

These new distribution partners are now authorized to offer their customers Wave's innovative solutions for data protection, data loss prevention, authentication, security compliance and malware protection.

"Today's cyber threats call for a unique and innovative approach, and one that builds on industry-standard hardware built directly into the endpoint. We're putting Wave's technology into the hands of top regional distributors whose relationships and trained service professionals offer a fast path to deployment," said Brian Berger, Wave's Executive Vice President of Business Development and Chief Marketing Officer. "Infodat is well-anchored in the Indian market and has earned the trust of its extensive client base. TechSearch is the trusted partner for Korea's IT industry; and Bangkok Systems & Software provides seasoned professionals on the ground in Thailand."

Under the terms of the agreements, Wave's distribution partners will offer both products and professional services. The distributors will offer Wave's EMBASSY® (http://www.wave.com/products) security software for managing hardware-based data protection and authentication, as well as the full Safend (http://www.wave.com/products) portfolio of products. Infodat Technologies has built a strong reputation in India and globally, providing technology services and business solutions for more than 16 years to help its clients innovate, automate information and optimize costs.

Providing Scholarships for First Responders: The 2013 SIA Ride for Education

The SIA Ride for Education will be held on Saturday, April 13, 2013. The event raises money for the SIA First Responders Scholarship, which provides awards of $1,000 to law enforcement officers and firefighters for job-related education and training -- opportunities for which funding might not otherwise be available because of budget cuts.

The ride will start at Las Vegas Harley-Davidson at 9:00 a.m. and will include visits to some of the most scenic sites in Nevada. The cost is $40 per person ($30 if riding as a passenger). Law enforcement officers, firefighters and military personnel may participate at no charge.

All registrants will receive a specially designed "2013 SIA Ride for Education" shirt. Lunch will be provided.

Participants who are not bringing their own motorcycles to the event may contact Las Vegas Harley-Davidson to reserve a bike at the special discounted rate of $125. Availability is limited, so reservations should be made as soon as possible by calling (888) 218-0744, or by visiting the store's rentals page (https://websolutions.tsd-inc.com/Harley-Davidson/frmRateQuote.aspx?PickupLoc=79315). To receive the reduced rate, mention the "SIA group" if reserving by phone, or enter "SIA group" in the Special Requests field if reserving online. We also welcome participants in sports cars and other vehicles. (The same registration rates apply.)

For more information, contact Ron Hawkins, SIA's manager of technical writing and special projects, at (301) 804-4713 or [email protected].

SecurityStockWatch.com: What is Security Dealer Marketing's main focus?
Bill Bozeman: Security Dealer Marketing (SDM) focuses on creating brand awareness for and educating dealers and manufacturers on how marketing tools work, from collateral production to strategy deployment, to generate more recurring monthly revenue. They focus on generating results and creating services that work specifically for the security community.

SecurityStockWatch.com: What types of managed services are included with Security Dealer Marketing?
Bill Bozeman: They can help with any marketing questions or needs, from traditional design/print services to targeted online campaigns to comprehensive marketing strategy overhaul or development. Security Dealer Marketing works with many types of semi-custom website development packages, including Search Engine Optimization (SEO), Pay-Per-Click (PPC) and Google Analytics services. They also offer marketing support for point of sale materials, logo design or redesign, email marketing, social media campaigns and press releases.

SecurityStockWatch.com: How can Security Dealer Marketing help companies better their business?
Bill Bozeman: Security Dealer Marketing can handle the logistics and details of your marketing programs, allowing you to focus on other areas of your business. With years of expertise in security marketing, they eliminate the guesswork. SDM has spent the last 15 years working with numerous large domestic brands, and they will take that experience and use it to guide your company to get greater return on investment. They work with a number of PSA integrators and partners and we've been pleased with the partnership, service and results.

Join the Ascent to EMV and Smart Mobile PaymentsOver 500 executive delegates came together last February in Salt Lake City for Payments Summit -- the industry's leading forum for smart, secure payment technology, implementation, and markets. For 2013, we're building on that success with a larger meeting facility and an up-to-the minute conference agenda. And we're continuing our coverage of every leading transaction platform: EMV card payments, mobile payments, and transit payments. Reserve your seat now at this gathering of leading smart card practitioners, solutions developers, end users, and suppliers.

The US is the world's largest payments ecosystem and the migration to EMV -- the global transaction security standard -- has now begun in earnest. Yet, for many banks, credit unions, issuers and merchants there's still a frustrating lack of clarity. At the same time, NFC-enabled payments are starting to take shape as card networks, telecoms and handset manufacturers target the market with mobile wallet solutions. But no ubiquitous model for all merchants and issuers has emerged. Finally, transit ridership is considered by many to be the "killer app" in expanding the use of open standards-based contactless bank card and mobile payments, and major transit operators have launched pilots nationwide.

Considerable work remains to clear a path for this migration. Payments Summit is the place to consult the trailblazers and plan your own journey.

"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.

What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...

An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen.
In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for ...

IoT is rapidly changing the way enterprises are using data to improve business decision-making. In order to derive business value, organizations must unlock insights from the data gathered and then act on these. In their session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, and Peter Shashkin, Head of Development Department at EastBanc Technologies, discussed how one organization leveraged IoT, cloud technology and data analysis to improve customer experiences and effici...

Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation.
In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...

In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lead...

The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location.
With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...

You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time.
In his session at 19th Cloud Expo, Mark Allen, General Manager of...

The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...

Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...

As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...

"Dice has been around for the last 20 years. We have been helping tech professionals find new jobs and career opportunities," explained Manish Dixit, VP of Product and Engineering at Dice, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.

Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases.
In his general session at @ThingsExpo, Dave McCarthy, Director of Products...

"ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.

The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT.
In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal...

Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou...

Video experiences should be unique and exciting! But that doesn’t mean you need to patch all the pieces yourself.
Users demand rich and engaging experiences and new ways to connect with you. But creating robust video applications at scale can be complicated, time-consuming and expensive. In his session at @ThingsExpo, Zohar Babin, Vice President of Platform, Ecosystem and Community at Kaltura, discussed how VPaaS enables you to move fast, creating scalable video experiences that reach your aud...

WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.

"At ROHA we develop an app called Catcha. It was developed after we spent a year meeting with, talking to, interacting with senior citizens watching them use their smartphones and talking to them about how they use their smartphones so we could get to know their smartphone behavior," explained Dave Woods, Chief Innovation Officer at ROHA, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.

20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world.
Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.

Monitoring of Docker environments is challenging. Why? Because each container typically runs a single process, has its own environment, utilizes virtual networks, or has various methods of managing storage. Traditional monitoring solutions take metrics from each server and applications they run. These servers and applications running on them are typically very static, with very long uptimes. Docker deployments are different: a set of containers may run many applications, all sharing the resources of one or more underlying hosts. It's not uncommon for Docker servers to run thousands of short-te...

The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location.
With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal today!

When was the last time you’ve ever heard anyone say “IT Applications & Operations”? Frankly, in my 30+ year career in IT, I don’t believe I’ve ever heard anyone use this term. The typical term we hear is IT Infrastructure & Operations. These two go together like Peanut Butter and Jelly, which tells us a lot about how we view the field of IT. For those that may not be familiar with the role of IT Operations, Joe Hertvik does a great job here of describing IT Operations Management as someone engaged in the role of providing this service to the business. As you can see it’s very interesting how ...

We've come across a lot of talk about "cloud-native" apps lately. (They even have their own foundation!) Developers build these apps specifically to run on a cloud-based infrastructure, with the kind of user interface we all expect from our apps now. Cloud-native applications are scalable, usable and flexible, usually packaged using containers.
It's a step further in the cloud computing journey, and a step away from the way we used to conceive of apps. Application development happened for many years inside an IT bubble, with a long development and deployment lifecycle. They were used only i...

Information self-service is undoubtedly one of the main drivers of Modern Data Management. From “data services marketplaces” to “self-service Big Data analytics,” one of the objectives of most data-related initiatives today is to provide business professionals with new ways to solve their information needs with the goals of achieving self-reliance and minimizing the IT bottleneck. However, is it realistic to expect business users to assume this job?
Studies [1] report that more than 60 percent of companies grade their experience with self-service initiatives as “average” or lower, with nearl...

The IoT continued its toddler-like growth and stumbles in 2016. Here are five trends to look for in 2017 as the IoT enters its adolescence and how to benefit from them.
1. Ecosystems begin to determine winners and losers
Previously these were nice in-the-future concerns; now they will really count. Filling out a whole product value proposition through partnerships has repeatedly proven its importance across B2B and enterprise software sectors. In the IoT, they will be even more critical.

Cloud Expo, Inc. has announced today that Andi Mann returns to 'DevOps at Cloud Expo 2017' as Conference Chair
The @DevOpsSummit at Cloud Expo will take place on June 6-8, 2017, at the Javits Center in New York City, NY.
"DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited to help the great team at @DevOpsSummit and Cloud Expo tell the world how they can leverage this emerging disruptive tr...

The time of year when crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen.
8 Predictions About How the Security Industry Will Fare in 2017 – An eWeek slideshow looking at areas like IoT, ransomware, automated attacks and the security skills shortage in the industry. Chris Preimesberger (@editingwhiz), who does a monthly #eweekchat on twitter, covers many of the worries facing organizations.

I recently recovered from ACDF surgery where they remove a herniated or degenerative disc in the neck and fuse the cervical bones above and below the disk. My body had a huge vulnerability where one good shove or fender bender could have ruptured my spinal cord. I had some items removed and added some hardware and now my risk of injury is greatly reduced.
Breaches are occurring at a record pace, botnets are consuming IoT devices and bandwidth, and the cloud is becoming a de-facto standard for many companies. Vulnerabilities are often found at the intersection of all three of these trends, so ...

In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain.
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management...

Okay, let me get this out there: I find the term “Citizen Data Scientist” confusing. Gartner defines a “citizen data scientist as “a person who creates or generates models that leverage predictive or prescriptive analytics but whose primary job function is outside of the field of statistics and analytics.” While we teach business users to “think like a data scientist” in their ability to identify those variables and metrics that might be better predictors of performance, I do not expect that the business stakeholders are going to be able to create and generate analytic models. I do not believe...

We have been seeing a sudden rise in the deployment of Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL). It looks like the long “AI winter” is finally over. It is interesting to note that AI was mentioned by Alan Turing in a paper he wrote back in 1950 to suggest that there is possibility to build machines with true intelligence. Then in 1956, John McCarthy organized a conference at Dartmounth and coined the phrase Artificial Intelligence. Much of the next three decades did not see much activity and hence the phrase “AI Winter” was coined. Around 1997, IBM’s Deep Blu...

Nerdio is an IT-as-a-service platform with virtual desktop infrastructure (VDI) technology at its core. It is designed for IT departments that need a way to easily manage their ever-increasing workloads. Nerdio allows users to efficiently manage their complete IT environments by giving them full visibility and control of users’ desktops. In addition to virtual desktops, the platform includes unlimited virtual servers, Microsoft Office 365 security, and disaster recovery and 24/7/365 support.

Reality itself is going through a digital transformation thanks to leaps in 3D rendering and the crunch-speed motion feedback data. Although the modern definition of virtual reality (VR) has been making promises for three decades, the emphasis was always on the potential. Now it’s here. This is a tour of the state of VR in 2016 and where developers are taking it as VR spreads far beyond the world of gaming.

Cyberattacks are relentless. The pace of attacks shows no sign of slowing, and organizations understand that 100 percent prevention of attacks is not possible. Traditional prevention and detection techniques are falling short, and security professionals are scrambling for new paradigms that can more effectively detect attacks and mitigate the growing levels of damage. In this climate of confusion, deception-based solutions offer a viable and proven way to stop attackers in their tracks. Why? Because instead of sitting back and waiting to be the victim, detection technologies let organizations ...

Cloud computing budgets worldwide are reaching into the hundreds of billions of dollars, and no organization can survive long without some sort of cloud migration strategy. Each month brings new announcements, use cases, and success stories.